Sciweavers

5255 search results - page 311 / 1051
» Formal Methods for Privacy
Sort
View
ADT
2010
15 years 4 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
CTW
2006
107views more  CTW 2006»
15 years 4 months ago
Human computer interaction methods for electronic flight bag envisionment and design
This paper reports on the application of a range of human computer interaction (HCI) methods to the redesign of an electronic flight bag (EFB), as part of a commercial software dev...
Joan Cahill, Nick McDonald
109
Voted
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
Deriving Specifications of Dependable Systems: toward a Method
Abstract--This paper proposes a method for deriving formal specifications of systems. To accomplish this task we pass through a non trivial number of steps, concepts and tools wher...
Manuel Mazzara
ANOR
2005
120views more  ANOR 2005»
15 years 4 months ago
Solving the Vehicle Routing Problem with Stochastic Demands using the Cross-Entropy Method
An alternate formulation of the classical vehicle routing problem with stochastic demands (VRPSD) is considered. We propose a new heuristic method to solve the problem. The algori...
Krishna Chepuri, Tito Homem-de-Mello
FM
1997
Springer
258views Formal Methods» more  FM 1997»
15 years 8 months ago
Consistent Graphical Specification of Distributed Systems
: The widely accepted possible benefits of formal methods on the one hand and their minor use compared to informal or graphical description techniques on the other hand have repeat...
Franz Huber, Bernhard Schätz, Geralf Einert